PT-2025-31705 · Traefik · Traefik
Odaysec
·
Published
2025-08-01
·
Updated
2025-08-02
·
CVE-2025-54386
7.3
High
Base vector | Vector | AV:N/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L |
Name of the Vulnerable Software and Affected Versions:
Traefik versions 2.11.27 and below
Traefik versions 3.0.0 through 3.4.4
Traefik version 3.5.0-rc1
Description:
Traefik is an HTTP reverse proxy and load balancer. A path traversal vulnerability exists in the WASM Traefik’s plugin installation mechanism. Supplying a maliciously crafted ZIP archive containing file paths with `../` sequences allows an attacker to overwrite arbitrary files on the system outside of the intended plugin directory. This can lead to remote code execution (RCE), privilege escalation, persistence, or denial of service.
Recommendations:
Update to Traefik version 2.11.28 or later.
Update to Traefik version 3.4.5 or later.
Update to Traefik version 3.5.0 or later.
Fix
RCE
LPE
DoS
Path traversal
Related Identifiers
Affected Products
References · 13
- https://nvd.nist.gov/vuln/detail/CVE-2025-54386 · Security Note
- https://osv.dev/vulnerability/GHSA-q6gg-9f92-r9wg · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-54386 · Vendor Advisory
- https://github.com/traefik/traefik⭐ 55838 🔗 5410 · Note
- https://github.com/traefik/traefik/releases/tag/v2.11.28⭐ 55836 🔗 5410 · Note
- https://github.com/traefik/traefik/security/advisories/GHSA-q6gg-9f92-r9wg⭐ 55836 🔗 5410 · Note
- https://github.com/traefik/traefik/commit/5ef853a0c53068f69a6c229a5815a0dc6e0a8800⭐ 55836 🔗 5410 · Note
- https://github.com/traefik/traefik/pull/11911⭐ 55836 🔗 5410 · Note
- https://github.com/traefik/plugin-service/pull/72⭐ 3 🔗 8 · Note
- https://github.com/traefik/plugin-service/pull/71⭐ 3 🔗 8 · Note
- https://twitter.com/CVEnew/status/1951431044667695351 · Twitter Post
- https://twitter.com/traefik/status/1951351450631635107 · Twitter Post
- https://t.me/CVEtracker/28992 · Telegram Post